DES-CBC/3DES-CBC support for VPP IPSec Core
[vpp.git] / src / vnet / ipsec / esp_encrypt.c
index 7b7f9b9..44a0451 100644 (file)
@@ -22,6 +22,7 @@
 #include <vnet/ipsec/ipsec.h>
 #include <vnet/ipsec/esp.h>
 
+ipsec_proto_main_t ipsec_proto_main;
 
 #define foreach_esp_encrypt_next                   \
 _(DROP, "error-drop")                              \
@@ -84,24 +85,30 @@ format_esp_encrypt_trace (u8 * s, va_list * args)
 }
 
 always_inline void
-esp_encrypt_aes_cbc (ipsec_crypto_alg_t alg,
-                    u8 * in, u8 * out, size_t in_len, u8 * key, u8 * iv)
+esp_encrypt_cbc (ipsec_crypto_alg_t alg,
+                u8 * in, u8 * out, size_t in_len, u8 * key, u8 * iv)
 {
-  esp_main_t *em = &esp_main;
-  u32 cpu_index = os_get_cpu_number ();
-  EVP_CIPHER_CTX *ctx = &(em->per_thread_data[cpu_index].encrypt_ctx);
+  ipsec_proto_main_t *em = &ipsec_proto_main;
+  u32 thread_index = vlib_get_thread_index ();
+#if OPENSSL_VERSION_NUMBER >= 0x10100000L
+  EVP_CIPHER_CTX *ctx = em->per_thread_data[thread_index].encrypt_ctx;
+#else
+  EVP_CIPHER_CTX *ctx = &(em->per_thread_data[thread_index].encrypt_ctx);
+#endif
   const EVP_CIPHER *cipher = NULL;
   int out_len;
 
   ASSERT (alg < IPSEC_CRYPTO_N_ALG);
 
-  if (PREDICT_FALSE (em->esp_crypto_algs[alg].type == IPSEC_CRYPTO_ALG_NONE))
+  if (PREDICT_FALSE
+      (em->ipsec_proto_main_crypto_algs[alg].type == IPSEC_CRYPTO_ALG_NONE))
     return;
 
-  if (PREDICT_FALSE (alg != em->per_thread_data[cpu_index].last_encrypt_alg))
+  if (PREDICT_FALSE
+      (alg != em->per_thread_data[thread_index].last_encrypt_alg))
     {
-      cipher = em->esp_crypto_algs[alg].type;
-      em->per_thread_data[cpu_index].last_encrypt_alg = alg;
+      cipher = em->ipsec_proto_main_crypto_algs[alg].type;
+      em->per_thread_data[thread_index].last_encrypt_alg = alg;
     }
 
   EVP_EncryptInit_ex (ctx, cipher, NULL, key, iv);
@@ -118,12 +125,13 @@ esp_encrypt_node_fn (vlib_main_t * vm,
   from = vlib_frame_vector_args (from_frame);
   n_left_from = from_frame->n_vectors;
   ipsec_main_t *im = &ipsec_main;
+  ipsec_proto_main_t *em = &ipsec_proto_main;
   u32 *recycle = 0;
-  u32 cpu_index = os_get_cpu_number ();
+  u32 thread_index = vlib_get_thread_index ();
 
   ipsec_alloc_empty_buffers (vm, im);
 
-  u32 *empty_buffers = im->empty_buffers[cpu_index];
+  u32 *empty_buffers = im->empty_buffers[thread_index];
 
   if (PREDICT_FALSE (vec_len (empty_buffers) < n_left_from))
     {
@@ -182,6 +190,8 @@ esp_encrypt_node_fn (vlib_main_t * vm,
              goto trace;
            }
 
+         sa0->total_data_size += i_b0->current_length;
+
          /* grab free buffer */
          last_empty_buffer = vec_len (empty_buffers) - 1;
          o_bi0 = empty_buffers[last_empty_buffer];
@@ -297,8 +307,10 @@ esp_encrypt_node_fn (vlib_main_t * vm,
          if (PREDICT_TRUE (sa0->crypto_alg != IPSEC_CRYPTO_ALG_NONE))
            {
 
-             const int BLOCK_SIZE = 16;
-             const int IV_SIZE = 16;
+             const int BLOCK_SIZE =
+               em->ipsec_proto_main_crypto_algs[sa0->crypto_alg].block_size;
+             const int IV_SIZE =
+               em->ipsec_proto_main_crypto_algs[sa0->crypto_alg].iv_size;
              int blocks = 1 + (i_b0->current_length + 1) / BLOCK_SIZE;
 
              /* pad packet in input buffer */
@@ -321,18 +333,21 @@ esp_encrypt_node_fn (vlib_main_t * vm,
              vnet_buffer (o_b0)->sw_if_index[VLIB_RX] =
                vnet_buffer (i_b0)->sw_if_index[VLIB_RX];
 
-             u8 iv[16];
+             u8 iv[em->
+                   ipsec_proto_main_crypto_algs[sa0->crypto_alg].iv_size];
              RAND_bytes (iv, sizeof (iv));
 
              clib_memcpy ((u8 *) vlib_buffer_get_current (o_b0) +
-                          ip_hdr_size + sizeof (esp_header_t), iv, 16);
-
-             esp_encrypt_aes_cbc (sa0->crypto_alg,
-                                  (u8 *) vlib_buffer_get_current (i_b0),
-                                  (u8 *) vlib_buffer_get_current (o_b0) +
-                                  ip_hdr_size + sizeof (esp_header_t) +
-                                  IV_SIZE, BLOCK_SIZE * blocks,
-                                  sa0->crypto_key, iv);
+                          ip_hdr_size + sizeof (esp_header_t), iv,
+                          em->ipsec_proto_main_crypto_algs[sa0->
+                                                           crypto_alg].iv_size);
+
+             esp_encrypt_cbc (sa0->crypto_alg,
+                              (u8 *) vlib_buffer_get_current (i_b0),
+                              (u8 *) vlib_buffer_get_current (o_b0) +
+                              ip_hdr_size + sizeof (esp_header_t) +
+                              IV_SIZE, BLOCK_SIZE * blocks,
+                              sa0->crypto_key, iv);
            }
 
          o_b0->current_length += hmac_calc (sa0->integ_alg, sa0->integ_key,